US20150142960A1 - Information processing apparatus, information processing method and information processing system - Google Patents
Information processing apparatus, information processing method and information processing system Download PDFInfo
- Publication number
- US20150142960A1 US20150142960A1 US14/484,834 US201414484834A US2015142960A1 US 20150142960 A1 US20150142960 A1 US 20150142960A1 US 201414484834 A US201414484834 A US 201414484834A US 2015142960 A1 US2015142960 A1 US 2015142960A1
- Authority
- US
- United States
- Prior art keywords
- identifier
- address
- list
- information processing
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H04L61/2076—
-
- H04L61/2015—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/103—Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
Definitions
- the embodiments discussed herein are related to a technique to manage devices coupled to a network.
- Various kinds of devices such as a server, a network device such as a local area network (LAN) switch, for example, and a storage device are coupled to a network built in an office or the like.
- a management apparatus to manage the devices coupled to the network is also coupled to the network, and performs management work such as monitoring of failures that may occur in the devices.
- a network administrator or the like can set the newly coupled device as a device to be managed by performing a setting operation on the management apparatus.
- the setting operation places a burden on the administrator.
- a Dynamic Host Configuration Protocol (DHCP) server in a network stores access information for a device management server configured to manage multifunction peripheral (MFP) devices coupled to the network.
- MFP multifunction peripheral
- Each of the MFP devices sends the DHCP server a message to request acquisition of the access information, and acquires the access information from a message received from the DHCP server.
- the MFP device sends the device management server device information unique to the MFP device by using the acquired access information, and sends the device management server device information indicating the state of the MFP device in response to a connection approval message from the device management server.
- the new technique is introduced into all of the DHCP server, the device management server and the MFP device. Therefore, in the case of building a system using the above conventional technique, all of the DHCP server, the device management server and the MFP device are modified or replaced with dedicated ones. Examples of related prior art documents include Japanese Laid-open Patent Publication No. 2011-165048.
- an information processing apparatus includes a memory, and a processor coupled to the memory and configured to acquire a first identifier indicating a device coupled to a network at a first time point, acquire a second identifier indicating a device coupled to the network at a second time point after the first time point, and determine whether or not the second identifier is identical to the first identifier.
- FIG. 1 is a diagram illustrating an overview of a system according to a first embodiment
- FIG. 2 is a functional block diagram of a management server according to the first embodiment
- FIG. 3 is a table illustrating an example of data stored in an assigned address storage unit
- FIG. 4 is a flowchart illustrating a main processing flow according to the first embodiment
- FIG. 5 is a table illustrating an example of an assigned address list
- FIG. 6 is a table illustrating an example of a checked address list
- FIG. 7 is a table illustrating an example of the checked address list
- FIG. 8 is a flowchart illustrating a processing flow of check processing
- FIG. 9 is a table illustrating an example of a management target address list
- FIG. 10 is a table illustrating an example of the management target address list
- FIG. 11 is a table illustrating an example of the management target address list
- FIG. 12 is a table illustrating an example of the management target address list
- FIG. 13 is a functional block diagram of a management server according to a second embodiment
- FIG. 14 is a table illustrating an example of a checked address list
- FIG. 15 is a flowchart illustrating a main processing flow according to the second embodiment
- FIG. 16 is a table illustrating an example of the checked address list
- FIG. 17 is a table illustrating an example of the checked address list
- FIG. 18 is a table illustrating an example of the checked address list
- FIG. 19 is a table illustrating an example of a list stored in an operation list storage unit
- FIG. 20 is a table illustrating an example of the checked address list
- FIG. 21 is a flowchart illustrating a main processing flow according to a third embodiment
- FIG. 22 is a table illustrating an example of a checked address list
- FIG. 23 is a table illustrating an example of the checked address list
- FIG. 24 is a table illustrating an example of the checked address list
- FIG. 25 is a table illustrating an example of the checked address list.
- FIG. 26 is a functional block diagram of a computer.
- FIG. 1 illustrates an overview of a system according to this embodiment.
- a device 31 and a device 32 which are servers, and a device 51 and a device 52 , which are devices other than servers, for example, a network switch, a storage device or the like, are coupled to a management server 1 configured to execute main processing of this embodiment, through a network 7 that is a LAN.
- the device 31 includes a Baseboard Management Controller (BMC) 311 with a LAN port 312
- the device 32 includes a BMC 321 with a LAN port 322 .
- the device 31 is coupled to the network 7 through the LAN port 312
- the device 32 is coupled to the network 7 through the LAN port 322 .
- the device 51 includes a LAN port 511 and is coupled to the network 7 through the LAN port 511 .
- the device 52 includes a LAN port 521 and is coupled to the network 7 through the LAN port 521 .
- the BMC 311 and the BMC 321 are compatible with an Intelligent Platform Management Interface (IPMI).
- IPMI Intelligent Platform Management Interface
- the management server 1 can perform remote control and management of the devices 31 and 32 through the BMCs 311 and 321 .
- the devices 51 and 52 can communicate with the management server 1 by using a Telecommunication Network (Telnet), a Simple Network Management Protocol (SNMP) or the like.
- Telnet Telecommunication Network
- SNMP Simple Network Management Protocol
- the device 31 and the device 51 are to be managed by the management server 1
- the device 32 and the device 52 are not to be managed by the management server 1 .
- both the number of devices to be managed and the number of devices not to be managed are two in FIG. 1 , the numbers thereof are not limited thereto. It depends on the management server 1 whether or not the devices are to be managed.
- FIG. 2 illustrates a functional block diagram of the management server 1 .
- the management server 1 includes an assigned address storage unit 101 , a DHCP processing unit 102 , a LAN port 103 , a management unit 104 including a detection unit 105 , a check unit 106 and a DB management unit 107 , a checked address storage unit 108 and a target address storage unit 109 .
- the management server 1 is coupled to the network 7 through the LAN port 103 .
- the DHCP processing unit 102 executes processing to assign Internet Protocol (IP) addresses to the devices coupled to the network 7 .
- IP Internet Protocol
- the DHCP processing unit 102 is typically on. When a new device is coupled to the network 7 and the device is powered on, the device requests the DHCP processing unit 102 to assign an IP address thereto. Upon receipt of the request, the DHCP processing unit 102 assigns an IP address to the device and stores the assigned IP address in the assigned address storage unit 101 . Meanwhile, when the device is uncoupled from the network 7 , the device no longer makes an IP address request to the DHCP processing unit 102 . Therefore, the DHCP processing unit 102 deletes the IP address assigned to the device from the assigned address storage unit 101 .
- the detection unit 105 periodically, for example, requests the DHCP processing unit 102 for an assigned address list, and acquires the assigned address list from the DHCP processing unit 102 .
- the detection unit 105 executes processing of detecting a device newly coupled to the network 7 , and the like, based on the assigned address list acquired from the DHCP processing unit 102 and a checked address list stored in the checked address storage unit 108 .
- the detection unit 105 instructs the check unit 106 to execute check processing.
- the check unit 106 communicates with the device newly coupled to the network 7 , and determines whether or not the device is to be managed by the management server 1 . When the device is determined to be managed by the management server 1 , the check unit 106 outputs an IP address and a Media Access Control (MAC) address of the device to the DB management unit 107 .
- MAC Media Access Control
- the DB management unit 107 stores the IP address and MAC address received from the check unit 106 in the target address storage unit 109 configured to store addresses of devices to be managed.
- FIG. 3 illustrates an example of an assigned address list stored in the assigned address storage unit 101 .
- MAC addresses and IP addresses are stored.
- the IP addresses are those assigned to the devices coupled to the network 7
- the MAC addresses are those of the devices.
- a format of the list stored in the checked address storage unit 108 and a format of the list stored in the target address storage unit 109 are the same as that of the list stored in the assigned address storage unit 101 . However, in the initial stage, no checked addresses are stored in the checked address storage unit 108 .
- the detection unit 105 requests the DHCP processing unit 102 for an assigned address list periodically, for example, once every second. Then, the detection unit 105 acquires the assigned address list from the DHCP processing unit 102 ( FIG. 4 : Step S 1 ).
- an assigned address list stored in the assigned address storage unit 101 at the time point of Step S 1 is a list illustrated in FIG. 5 , for example. More specifically, it is assumed that two devices are coupled to the network 7 .
- a device having a MAC address “00-11-22-33-44-55” and an IP address “10.10.10.10” is referred to as a device A
- a device having a MAC address “00-11-22-33-44-56” and an IP address “10.10.10.11” is referred to as a device B.
- the detection unit 105 determines whether or not the assigned address list includes an unprocessed address (Step S 3 ). Note that, when the processing of Step S 3 is executed for the first time, the assigned address list does not include any processed address. Also, the “address” in this processing means a set of a MAC address and an IP address.
- Step S 3 When there are unprocessed addresses (Step S 3 : Yes route), the detection unit 105 specifies one unprocessed address (Step S 5 ). Then, the detection unit 105 determines whether or not the specified address is a new address that is not included in a checked address list, that is, a list of addresses stored in the checked address storage unit 108 (Step S 7 ).
- the address not included in the checked address list is an address of a device newly coupled to the network 7 , which is a new address. Note that, when the processing of Step S 7 is executed for the first time, no addresses are included in the checked address list. Therefore, all the addresses in the assigned address list are new addresses.
- a checked address list stored in the checked address storage unit 108 at the time point of Step S 9 is a list illustrated in FIG. 6 . More specifically, it is assumed that the address of the device A is stored in the checked address storage unit 108 . In this case, the address of the device A from the two addresses illustrated in FIG. 5 is determined not to be a new address, and the address of the device B is determined to be a new address.
- an assigned address list previously acquired is stored in the checked address storage unit 108 . It is assumed that a list illustrated in FIG. 7 is stored in the checked address storage unit 108 . More specifically, it is assumed that an address of a device (hereinafter referred to as a device C) having a MAC address “00-11-22-33-44-54” and an IP address “10.10.10.9”, the address of the device A and the address of the device B are stored. Also, an assigned address list acquired this time is the list illustrated in FIG. 5 . In such a case, the device C is uncoupled from the network 7 , while the devices A and B stay coupled to the network 7 .
- a device C having a MAC address “00-11-22-33-44-54” and an IP address “10.10.10.9”
- Step S 9 when the specified address is not a new address (Step S 9 : No route), the detection unit 105 deletes the address specified in Step S 7 from the checked address list (Step S 17 ). By this processing, the address of the device uncoupled from the network 7 remains in the checked address list.
- Step S 9 when the specified address is a new address (Step S 9 : Yes route), the detection unit 105 instructs the check unit 106 to execute check processing. In response to this instruction, the check unit 106 executes the check processing (Step S 11 ).
- the check processing is described with reference to FIG. 8 .
- the check unit 106 transmits data to the device having the address specified in Step S 5 ( FIG. 8 : Step S 31 ).
- the transmitted data is an IPMI command, for example, a get Field Replaceable Unit (FRU) command.
- the transmitted data is Telnet or SNMP data.
- the check unit 106 determines whether or not there is a response to the data transmitted in Step S 31 (Step S 33 ). When there is no response (Step S 33 : No route), the check unit 106 outputs data to the detection unit 105 , the data indicating that the device is not to be managed (Step S 35 ).
- Step S 33 when there is a response (Step S 33 : Yes route), the check unit 106 analyzes a content of the response (Step S 37 ).
- the response includes a product name, for example.
- the check unit 106 can check, based on the product name, whether or not the device is to be managed.
- Step S 39 When the destination device is not to be managed (Step S 39 : No route), the processing moves to Step S 35 .
- Step S 39 Yes route
- the check unit 106 outputs data to the detection unit 105 , the data indicating that the device is to be managed (Step S 41 ). Then, the processing returns to that of the invoker.
- the execution of such processing enables determination of whether or not the device newly coupled to the network 7 is to be managed.
- the detection unit 105 determines whether or not the device having the address specified in Step S 5 is to be managed (Step S 13 ). When the device is not to be managed (Step S 13 : No route), the processing returns to Step S 3 for processing of the next address.
- Step S 13 when the device is to be managed (Step S 13 : Yes route), the detection unit 105 outputs the address specified in Step S 5 to the DB management unit 107 .
- the DB management unit 107 Upon receipt of the specified address, the DB management unit 107 adds the received address to a management target address list stored in the target address storage unit 109 (Step S 15 ). Then, the processing returns to Step S 3 .
- a list illustrated in FIG. 9 for example, is stored in the target address storage unit 109 . In the example illustrated in FIG. 9 , a list including the address of the device A and the address of the device B is stored.
- Step S 3 When it is determined in Step S 3 that the assigned address list includes no unprocessed address (Step S 3 : No route), the detection unit 105 deletes an address, included in both the management target address list and the checked address list, from the management target address list (Step S 19 ).
- Step S 3 A specific example for the case where the No route is taken in Step S 3 is provided herein.
- the address stored in the checked address storage unit 108 is the address of the device C as illustrated in FIG. 10 ; and also that the management target address list in the target address storage unit 109 before execution of processing in Step S 19 includes the address of the device C and the address of the device A as illustrated in FIG. 11 .
- the management target address list becomes one illustrated in FIG. 12 . In other words, only the address of the device A is included in the management target address list.
- the detection unit 105 replaces the address included in the checked address list with the address included in the assigned address list (Step S 21 ), and stores the address in the checked address storage unit 108 . Then, the processing returns to Step S 1 .
- the assigned address list acquired this time is used as the checked address list next time.
- lists of assigned addresses can be acquired at multiple time points, and the acquired lists can be compared with each other.
- the management server 1 can automatically detect a device when the device is coupled to the network 7 . Therefore, a network administrator or the like who operates the management server 1 does not have to search for the newly coupled device by inputting an IP address and the like. Thus, costs can be reduced.
- the detection unit 105 uses the set of IP address and MAC address for the processing.
- the processing of searching through the list is performed for both of the IP address and the MAC address, the processing may take time. Therefore, in the second embodiment, a key is associated with a set of an IP address and a MAC address for use in processing by the detection unit 105 .
- FIG. 13 illustrates a functional block diagram of a management server.
- a management server 1 includes an assigned address storage unit 101 , a DHCP processing unit 102 , a LAN port 103 , a management unit 104 including a detection unit 105 , a check unit 106 and a DB management unit 107 , a checked address storage unit 108 , a target address storage unit 109 and an operation list storage unit 110 .
- the management server 1 according to the second embodiment is different from the management server 1 according to the first embodiment in including the operation list storage unit 110 .
- FIG. 14 illustrates an example of a list stored in the checked address storage unit 108 .
- a key including a MAC address and an IP address, the MAC address and the IP address are stored.
- the key is generated from the MAC address and the IP address. Note that other data to be used by the management unit 104 may be further stored. However, in the initial stage, no list is stored in the checked address storage unit 108 .
- a format of a list stored in the operation list storage unit 110 is the same as that of the list stored in the checked address storage unit 108 .
- a format of a list stored in the assigned address storage unit 101 and a format of a list stored in the target address storage unit 109 are the same as that of the list stored in the assigned address storage unit 101 according to the first embodiment.
- the detection unit 105 requests the DHCP processing unit 102 for an assigned address list periodically, for example, once every second. Then, the detection unit 105 acquires the assigned address list from the DHCP processing unit 102 ( FIG. 15 : Step S 51 ).
- the assigned address list acquired in Step S 51 is the list illustrated in FIG. 5 , for example.
- the detection unit 105 generates an empty operation list and stores the generated operation list in the operation list storage unit 110 (Step S 53 ).
- the detection unit 105 determines whether or not the assigned address list includes an unprocessed address (Step S 55 ). Note that, when the processing of Step S 55 is executed for the first time, the assigned address list includes no processed addresses. Also, the “address” in this processing means a set of a MAC address and an IP address.
- Step S 55 When there are unprocessed addresses (Step S 55 : Yes route), the detection unit 105 specifies one unprocessed address (Step S 57 ). Then, the detection unit 105 generates a key from a MAC address and an IP address, which are included in the specified address (Step S 59 ). The key is generated by connecting the MAC address and the IP address, for example.
- the detection unit 105 determines whether or not the address corresponding to the key generated in Step S 59 is included in a checked address list (Step S 61 ).
- the address not included in the checked address list is an address of a device newly coupled to the network 7 , which is a new address. Note that, when the processing of Step S 61 is executed for the first time, no addresses are included in the checked address list.
- a checked address list stored in the checked address storage unit 108 at the time point of Step S 61 is a list illustrated in FIG. 16 . More specifically, it is assumed that the key and address of the device A are stored in the checked address storage unit 108 . In this case, the address of the device A from the two addresses illustrated in FIG. 5 is determined not to be a new address, and the address of the device B is determined to be a new address.
- a list illustrated in FIG. 17 is stored in the checked address storage unit 108 . More specifically, it is assumed that the key and address of the device C, the key and address of the device A and the key and address of the device B are stored. It is also assumed that an assigned address list acquired this time is the list illustrated in FIG. 5 . In this case, the device C is uncoupled from the network 7 , while the devices A and B stay coupled to the network 7 .
- Step S 61 when the address corresponding to the key generated in Step S 59 is included in the checked address list (Step S 61 : Yes route), the detection unit 105 deletes the key generated in Step S 59 and the address specified in Step S 57 from the checked address list (Step S 63 ). Then, the processing moves to Step S 71 .
- the checked address list is the list illustrated in FIG. 17 and the assigned address list is the list illustrated in FIG. 5
- the checked address list turns out to be one illustrated in FIG. 18 after completion of Step S 63 .
- the key and address of the device C remain in the checked address list.
- Step S 61 when the address corresponding to the key generated in Step S 59 is not included in the checked address list (Step S 61 : No route), the detection unit 105 instructs the check unit 106 to execute check processing. In response to this instruction, the check unit 106 executes the check processing (Step S 65 ).
- the check processing is as described with reference to FIG. 8 .
- Step S 67 the detection unit 105 determines whether or not the device having the address specified in Step S 57 is to be managed.
- Step S 67 No route
- Step S 67 when the device is to be managed (Step S 67 : Yes route), the detection unit 105 outputs the address specified in Step S 57 to the DB management unit 107 .
- the DB management unit 107 Upon receipt of the specified address, the DB management unit 107 adds the received address to a management target address list stored in the target address storage unit 109 (Step S 69 ). Then, the processing moves to Step S 71 .
- the detection unit 105 adds the key generated in Step S 59 and the address specified in Step S 57 to the operation list stored in the operation list storage unit 110 (Step S 71 ). Then, the processing returns to Step S 55 .
- the operation list storage unit 110 stores an operation list as illustrated in FIG. 19 , for example.
- the operation list includes the key and address of the device A and the key and address of the device B.
- Step S 55 When it is determined in Step S 55 that the assigned address list includes no unprocessed address (Step S 55 : No route), the detection unit 105 deletes an address, which is included in both the management target address list and the checked address list, from the management target address list (Step S 73 ).
- the detection unit 105 replaces the address included in the checked address list with the address included in the operation list (Step S 75 ), and stores the address in the checked address storage unit 108 . Then, the processing returns to Step S 51 . As described above, the operation list created this time is used as the checked address list next time.
- the execution of the processing as described above enables the detection unit 105 to perform processing using keys. Thus, the processing speed can be increased.
- a third embodiment is described.
- the operation list storage unit 110 is provided to use keys.
- keys can be used without providing the operation list storage unit 110 . Therefore, a functional block diagram of a management server 1 is the same as that of the management server 1 according to the first embodiment.
- FIG. 20 illustrates an example of a checked address list stored in the checked address storage unit 108 .
- keys each including a MAC address and an IP address, MAC addresses, IP addresses and delete flags are stored.
- the key is generated from the MAC address and the IP address.
- the key and address having a delete flag “1” are those of a device that is uncoupled from the network 7 . Note that other data to be used by the management unit 104 may be further stored.
- the detection unit 105 requests the DHCP processing unit 102 for an assigned address list periodically, for example, once every second. Then, the detection unit 105 acquires the assigned address list from the DHCP processing unit 102 ( FIG. 21 : Step S 81 ).
- the assigned address list acquired in Step S 81 is the list illustrated in FIG. 5 , for example.
- the detection unit 105 sets all the delete flags in the checked address list to 1 (Step S 83 ). After the processing of Step S 83 , the checked address list turns out to be one illustrated in FIG. 22 , for example. In the example illustrated in FIG. 22 , the delete flags “1” are set to the keys and addresses of the devices A to C.
- the detection unit 105 determines whether or not the assigned address list includes an unprocessed address (Step S 85 ). Note that, when the processing of Step S 85 is executed for the first time, the assigned address list includes no processed addresses. Also, the “address” in this processing means a set of a MAC address and an IP address.
- Step S 85 When there are unprocessed addresses (Step S 85 : Yes route), the detection unit 105 specifies one unprocessed address (Step S 87 ). Then, the detection unit 105 generates a key from a MAC address and an IP address, which are included in the specified address (Step S 89 ). The key is generated by connecting the MAC address and the IP address, for example.
- the detection unit 105 determines whether or not the address corresponding to the key generated in Step S 89 is included in a checked address list (Step S 91 ).
- the address not included in the checked address list is an address of a device newly coupled to the network 7 , which is a new address. Note that, when the processing of Step S 91 is executed for the first time, no addresses are included in the checked address list.
- a checked address list stored in the checked address storage unit 108 at the time point of Step S 91 is a list illustrated in FIG. 23 . More specifically, it is assumed that the address of the device A is stored in the checked address storage unit 108 . In this case, the address of the device A from the two addresses illustrated in FIG. 5 is determined not to be a new address, and the address of the device B is determined to be a new address.
- a list illustrated in FIG. 22 is stored in the checked address storage unit 108 . More specifically, it is assumed that the key and address of the device C, the key and address of the device A and the key and address of the device B are stored. It is also assumed that an assigned address list acquired this time is the list illustrated in FIG. 5 . In this case, the device C is uncoupled from the network 7 , while the devices A and B stay coupled to the network 7 .
- Step S 91 when the address corresponding to the key generated in Step S 89 is included in the checked address list (Step S 91 : Yes route), the detection unit 105 sets the delete flag for the key generated in Step S 89 to 0 (Step S 93 ). Then, the processing returns to Step S 85 . Accordingly, the delete flag “1” is set for the key and address of the device uncoupled from the network 7 .
- the checked address list is the list illustrated in FIG. 22 and the assigned address list is the list illustrated in FIG. 5 .
- the checked address list turns out to be one illustrated in FIG. 24 after completion of Step S 93 .
- the delete flag “1” is set for the device C, while the delete flag “0” is set for each of the devices A and B.
- Step S 95 the check processing is as described with reference to FIG. 8 .
- Step S 97 the detection unit 105 determines whether or not the device having the address specified in Step S 87 is to be managed.
- Step S 97 No route
- Step S 97 when the device is to be managed (Step S 97 : Yes route), the detection unit 105 outputs the address specified in Step S 87 to the DB management unit 107 .
- the DB management unit 107 Upon receipt of the specified address, the DB management unit 107 adds the received address to a management target address list stored in the target address storage unit 109 (Step S 99 ). Then, the processing moves to Step S 101 .
- the detection unit 105 adds the key generated in Step S 89 and the address specified in Step S 87 to the checked address list stored in the checked address storage unit 108 (Step S 101 ). Then, the processing returns to Step S 85 .
- Step S 85 When it is determined in Step S 85 that the assigned address list includes no unprocessed address (Step S 85 : No route), the detection unit 105 specifies an address having the delete flag “1” set in the checked address list (Step S 103 ).
- the detection unit 105 deletes the address specified in Step S 103 from the management target address list and the checked address list (Step S 105 ). Then, the processing returns to Step S 81 .
- the checked address list illustrated in FIG. 24 turns out to be one illustrated in FIG. 25 after the execution of the processing of Steps S 103 and S 105 . More specifically, the key and address of the device A and the key and address of the device B are stored in the checked address list. As described above, the keys and addresses of the devices coupled to the network 7 are stored in the checked address list.
- the execution of the processing as described above enables the use of keys without providing the operation list storage unit 110 in the management server 1 .
- the present disclosure is not limited thereto.
- the functional block configurations of the management server 1 described above may not coincide with an actual program module configuration.
- each of the tables described above is an example, and the configurations of the tables do not have to be those described above.
- the processing order may be changed as long as the processing result is not changed.
- the processing may be performed in parallel.
- the format of the key is not limited to that described above.
- the management server 1 described above is a computer device, in which a memory 2501 , a central processing unit (CPU) 2503 , a hard disk drive (HDD) 2505 , a display control unit 2507 coupled to a display unit 2509 , a drive unit 2513 for a removable disk 2511 , an input unit 2515 , and a communication control unit 2517 for connection to a network are coupled to each other through a bus 2519 .
- An operating system (OS) and an application program for carrying out the processing in this example are stored in the HDD 2505 , and are read into the memory 2501 from the HDD 2505 when executed by the CPU 2503 .
- OS operating system
- an application program for carrying out the processing in this example are stored in the HDD 2505 , and are read into the memory 2501 from the HDD 2505 when executed by the CPU 2503 .
- the CPU 2503 controls the display control unit 2507 , the communication control unit 2517 and the drive unit 2513 according to processing contents of the application program to perform predetermined operations. Also, data that is being processed is mostly stored in the memory 2501 , but may be stored in the HDD 2505 .
- the application program for carrying out the processing described above is stored in the computer-readable removable disk 2511 for distribution and is installed into the HDD 2505 from the drive unit 2513 . Alternatively, the application program may be installed into the HDD 2505 through a network such as the Internet and the communication control unit 2517 .
- various functions as described above are realized by organized cooperation between the hardware such as the CPU 2503 and the memory 2501 and the programs such as the OS and the application program described above.
- a management apparatus includes: (A) an acquisition unit configured to acquire identifiers of one or more devices coupled to a network; and (B) a detection unit configured to compare identifiers acquired by the acquisition unit at a first time point with identifiers acquired by the acquisition unit at a second time point prior to the first time point, and detect an identifier, which is not included in the identifiers acquired at the second time point, from among the identifiers acquired at the first time point.
- Such a configuration enables simple detection of a device newly coupled to the network without introducing a special mechanism into the device.
- the management apparatus further includes: (C) a determination unit configured to determine whether or not the first device is to be managed, based on data indicated by the identifier detected by the detection unit and acquired from the first device; and (D) a data management unit configured to add the identifier of the first device, when the first device is determined to be managed, to a data storage unit configured to store identifiers of devices to be managed. With such a configuration, management of the device indicated by the detected identifier can be started.
- the detection unit described above may (b1) detect an identifier not included in the identifiers acquired at the first time point, from among the identifiers acquired at the second time point, and delete one or more of the detected identifiers from the data storage unit, if the one or more detected identifiers are stored in the data storage unit.
- the identifier described above may include an IP address and a MAC address.
- the detection unit described above may (b2) generate one key from the IP address and the MAC address and use the key as the identifier.
- the detection processing may take time. Therefore, the use of one key generated from the IP address and the MAC address can reduce the time for the detection processing.
- the acquisition unit described above may (a1) perform DHCP processing.
- the use of a DHCP enables simple acquisition of identifiers.
- a management method includes: (E) acquiring identifiers of one or more devices coupled to a network at a first time point; (F) acquiring identifiers of one or more devices coupled to the network at a second time point after the first time point; and (G) comparing the identifiers acquired at the first time point with the identifiers acquired at the second time point, and detecting an identifier not included in the identifiers acquired at the second time point, from among the identifiers acquired at the first time point.
- a program can be created to allow a computer to perform processing by the method described above.
- the program is stored in a flexible disk, a CD-ROM, a magneto-optical disk, a semiconductor memory, a computer-readable storage medium such as a hard disk or a storage unit.
- an intermediate processing result is temporarily stored in a storage unit such as a main memory.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
An information processing apparatus includes a memory, and a processor coupled to the memory and configured to acquire a first identifier indicating a device coupled to a network at a first time point, acquire a second identifier indicating a device coupled to the network at a second time point after the first time point, and determine whether or not the second identifier is identical to the first identifier.
Description
- This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2013-240518, filed on Nov. 21, 2013, the entire contents of which are incorporated herein by reference.
- The embodiments discussed herein are related to a technique to manage devices coupled to a network.
- Various kinds of devices such as a server, a network device such as a local area network (LAN) switch, for example, and a storage device are coupled to a network built in an office or the like. A management apparatus to manage the devices coupled to the network is also coupled to the network, and performs management work such as monitoring of failures that may occur in the devices.
- When a device is newly coupled to the network, a network administrator or the like can set the newly coupled device as a device to be managed by performing a setting operation on the management apparatus. However, if the number of devices coupled to the network is very large, for example, several hundred or more, the setting operation places a burden on the administrator.
- Regarding such a problem, the following technique has been proposed. To be more specific, a Dynamic Host Configuration Protocol (DHCP) server in a network stores access information for a device management server configured to manage multifunction peripheral (MFP) devices coupled to the network. Each of the MFP devices sends the DHCP server a message to request acquisition of the access information, and acquires the access information from a message received from the DHCP server. Then, the MFP device sends the device management server device information unique to the MFP device by using the acquired access information, and sends the device management server device information indicating the state of the MFP device in response to a connection approval message from the device management server.
- However, in the conventional technique described above, the new technique is introduced into all of the DHCP server, the device management server and the MFP device. Therefore, in the case of building a system using the above conventional technique, all of the DHCP server, the device management server and the MFP device are modified or replaced with dedicated ones. Examples of related prior art documents include Japanese Laid-open Patent Publication No. 2011-165048.
- According to an aspect of the invention, an information processing apparatus includes a memory, and a processor coupled to the memory and configured to acquire a first identifier indicating a device coupled to a network at a first time point, acquire a second identifier indicating a device coupled to the network at a second time point after the first time point, and determine whether or not the second identifier is identical to the first identifier.
- The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
- It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
-
FIG. 1 is a diagram illustrating an overview of a system according to a first embodiment; -
FIG. 2 is a functional block diagram of a management server according to the first embodiment; -
FIG. 3 is a table illustrating an example of data stored in an assigned address storage unit; -
FIG. 4 is a flowchart illustrating a main processing flow according to the first embodiment; -
FIG. 5 is a table illustrating an example of an assigned address list; -
FIG. 6 is a table illustrating an example of a checked address list; -
FIG. 7 is a table illustrating an example of the checked address list; -
FIG. 8 is a flowchart illustrating a processing flow of check processing; -
FIG. 9 is a table illustrating an example of a management target address list; -
FIG. 10 is a table illustrating an example of the management target address list; -
FIG. 11 is a table illustrating an example of the management target address list; -
FIG. 12 is a table illustrating an example of the management target address list; -
FIG. 13 is a functional block diagram of a management server according to a second embodiment; -
FIG. 14 is a table illustrating an example of a checked address list; -
FIG. 15 is a flowchart illustrating a main processing flow according to the second embodiment; -
FIG. 16 is a table illustrating an example of the checked address list; -
FIG. 17 is a table illustrating an example of the checked address list; -
FIG. 18 is a table illustrating an example of the checked address list; -
FIG. 19 is a table illustrating an example of a list stored in an operation list storage unit; -
FIG. 20 is a table illustrating an example of the checked address list; -
FIG. 21 is a flowchart illustrating a main processing flow according to a third embodiment; -
FIG. 22 is a table illustrating an example of a checked address list; -
FIG. 23 is a table illustrating an example of the checked address list; -
FIG. 24 is a table illustrating an example of the checked address list; -
FIG. 25 is a table illustrating an example of the checked address list; and -
FIG. 26 is a functional block diagram of a computer. -
FIG. 1 illustrates an overview of a system according to this embodiment. Adevice 31 and a device 32, which are servers, and adevice 51 and a device 52, which are devices other than servers, for example, a network switch, a storage device or the like, are coupled to amanagement server 1 configured to execute main processing of this embodiment, through a network 7 that is a LAN. Thedevice 31 includes a Baseboard Management Controller (BMC) 311 with aLAN port 312, and the device 32 includes a BMC 321 with a LAN port 322. Thedevice 31 is coupled to the network 7 through theLAN port 312, and the device 32 is coupled to the network 7 through the LAN port 322. Thedevice 51 includes aLAN port 511 and is coupled to the network 7 through theLAN port 511. The device 52 includes aLAN port 521 and is coupled to the network 7 through theLAN port 521. - The BMC 311 and the BMC 321 are compatible with an Intelligent Platform Management Interface (IPMI). The
management server 1 can perform remote control and management of thedevices 31 and 32 through the BMCs 311 and 321. Thedevices 51 and 52 can communicate with themanagement server 1 by using a Telecommunication Network (Telnet), a Simple Network Management Protocol (SNMP) or the like. Thedevice 31 and thedevice 51 are to be managed by themanagement server 1, while the device 32 and the device 52 are not to be managed by themanagement server 1. Although both the number of devices to be managed and the number of devices not to be managed are two inFIG. 1 , the numbers thereof are not limited thereto. It depends on themanagement server 1 whether or not the devices are to be managed. -
FIG. 2 illustrates a functional block diagram of themanagement server 1. Themanagement server 1 includes an assignedaddress storage unit 101, aDHCP processing unit 102, aLAN port 103, amanagement unit 104 including adetection unit 105, acheck unit 106 and aDB management unit 107, a checkedaddress storage unit 108 and a targetaddress storage unit 109. - The
management server 1 is coupled to the network 7 through theLAN port 103. TheDHCP processing unit 102 executes processing to assign Internet Protocol (IP) addresses to the devices coupled to the network 7. - The
DHCP processing unit 102 is typically on. When a new device is coupled to the network 7 and the device is powered on, the device requests theDHCP processing unit 102 to assign an IP address thereto. Upon receipt of the request, theDHCP processing unit 102 assigns an IP address to the device and stores the assigned IP address in the assignedaddress storage unit 101. Meanwhile, when the device is uncoupled from the network 7, the device no longer makes an IP address request to theDHCP processing unit 102. Therefore, theDHCP processing unit 102 deletes the IP address assigned to the device from the assignedaddress storage unit 101. - The
detection unit 105 periodically, for example, requests theDHCP processing unit 102 for an assigned address list, and acquires the assigned address list from theDHCP processing unit 102. Thedetection unit 105 executes processing of detecting a device newly coupled to the network 7, and the like, based on the assigned address list acquired from theDHCP processing unit 102 and a checked address list stored in the checkedaddress storage unit 108. Upon detection of the device newly coupled to the network 7, thedetection unit 105 instructs thecheck unit 106 to execute check processing. - The
check unit 106 communicates with the device newly coupled to the network 7, and determines whether or not the device is to be managed by themanagement server 1. When the device is determined to be managed by themanagement server 1, thecheck unit 106 outputs an IP address and a Media Access Control (MAC) address of the device to theDB management unit 107. - The
DB management unit 107 stores the IP address and MAC address received from thecheck unit 106 in the targetaddress storage unit 109 configured to store addresses of devices to be managed. -
FIG. 3 illustrates an example of an assigned address list stored in the assignedaddress storage unit 101. In the example illustrated inFIG. 3 , MAC addresses and IP addresses are stored. The IP addresses are those assigned to the devices coupled to the network 7, and the MAC addresses are those of the devices. - A format of the list stored in the checked
address storage unit 108 and a format of the list stored in the targetaddress storage unit 109 are the same as that of the list stored in the assignedaddress storage unit 101. However, in the initial stage, no checked addresses are stored in the checkedaddress storage unit 108. - Next, with reference to
FIGS. 4 to 12 , description is given of processing executed by themanagement server 1. First, thedetection unit 105 requests theDHCP processing unit 102 for an assigned address list periodically, for example, once every second. Then, thedetection unit 105 acquires the assigned address list from the DHCP processing unit 102 (FIG. 4 : Step S1). - Here, it is assumed that an assigned address list stored in the assigned
address storage unit 101 at the time point of Step S1 is a list illustrated inFIG. 5 , for example. More specifically, it is assumed that two devices are coupled to the network 7. Hereinafter, for convenience of explanation, a device having a MAC address “00-11-22-33-44-55” and an IP address “10.10.10.10” is referred to as a device A, while a device having a MAC address “00-11-22-33-44-56” and an IP address “10.10.10.11” is referred to as a device B. - The
detection unit 105 determines whether or not the assigned address list includes an unprocessed address (Step S3). Note that, when the processing of Step S3 is executed for the first time, the assigned address list does not include any processed address. Also, the “address” in this processing means a set of a MAC address and an IP address. - When there are unprocessed addresses (Step S3: Yes route), the
detection unit 105 specifies one unprocessed address (Step S5). Then, thedetection unit 105 determines whether or not the specified address is a new address that is not included in a checked address list, that is, a list of addresses stored in the checked address storage unit 108 (Step S7). The address not included in the checked address list is an address of a device newly coupled to the network 7, which is a new address. Note that, when the processing of Step S7 is executed for the first time, no addresses are included in the checked address list. Therefore, all the addresses in the assigned address list are new addresses. - Here, it is assumed that a checked address list stored in the checked
address storage unit 108 at the time point of Step S9 is a list illustrated inFIG. 6 . More specifically, it is assumed that the address of the device A is stored in the checkedaddress storage unit 108. In this case, the address of the device A from the two addresses illustrated inFIG. 5 is determined not to be a new address, and the address of the device B is determined to be a new address. - Note that, as described later, an assigned address list previously acquired is stored in the checked
address storage unit 108. It is assumed that a list illustrated inFIG. 7 is stored in the checkedaddress storage unit 108. More specifically, it is assumed that an address of a device (hereinafter referred to as a device C) having a MAC address “00-11-22-33-44-54” and an IP address “10.10.10.9”, the address of the device A and the address of the device B are stored. Also, an assigned address list acquired this time is the list illustrated inFIG. 5 . In such a case, the device C is uncoupled from the network 7, while the devices A and B stay coupled to the network 7. - Referring back to
FIG. 4 , when the specified address is not a new address (Step S9: No route), thedetection unit 105 deletes the address specified in Step S7 from the checked address list (Step S17). By this processing, the address of the device uncoupled from the network 7 remains in the checked address list. - On the other hand, when the specified address is a new address (Step S9: Yes route), the
detection unit 105 instructs thecheck unit 106 to execute check processing. In response to this instruction, thecheck unit 106 executes the check processing (Step S11). The check processing is described with reference toFIG. 8 . - First, the
check unit 106 transmits data to the device having the address specified in Step S5 (FIG. 8 : Step S31). When the destination is a server, the transmitted data is an IPMI command, for example, a get Field Replaceable Unit (FRU) command. Meanwhile, when the destination is a device other than the server, the transmitted data is Telnet or SNMP data. - The
check unit 106 determines whether or not there is a response to the data transmitted in Step S31 (Step S33). When there is no response (Step S33: No route), thecheck unit 106 outputs data to thedetection unit 105, the data indicating that the device is not to be managed (Step S35). - On the other hand, when there is a response (Step S33: Yes route), the
check unit 106 analyzes a content of the response (Step S37). The response includes a product name, for example. Thecheck unit 106 can check, based on the product name, whether or not the device is to be managed. - When the destination device is not to be managed (Step S39: No route), the processing moves to Step S35. On the other hand, when the destination device is to be managed (Step S39: Yes route), the
check unit 106 outputs data to thedetection unit 105, the data indicating that the device is to be managed (Step S41). Then, the processing returns to that of the invoker. - The execution of such processing enables determination of whether or not the device newly coupled to the network 7 is to be managed.
- Referring back to
FIG. 4 , based on the result of the check processing, thedetection unit 105 determines whether or not the device having the address specified in Step S5 is to be managed (Step S13). When the device is not to be managed (Step S13: No route), the processing returns to Step S3 for processing of the next address. - On the other hand, when the device is to be managed (Step S13: Yes route), the
detection unit 105 outputs the address specified in Step S5 to theDB management unit 107. Upon receipt of the specified address, theDB management unit 107 adds the received address to a management target address list stored in the target address storage unit 109 (Step S15). Then, the processing returns to Step S3. A list illustrated inFIG. 9 , for example, is stored in the targetaddress storage unit 109. In the example illustrated inFIG. 9 , a list including the address of the device A and the address of the device B is stored. - When it is determined in Step S3 that the assigned address list includes no unprocessed address (Step S3: No route), the
detection unit 105 deletes an address, included in both the management target address list and the checked address list, from the management target address list (Step S19). - A specific example for the case where the No route is taken in Step S3 is provided herein. For example, it is assumed that the address stored in the checked
address storage unit 108 is the address of the device C as illustrated inFIG. 10 ; and also that the management target address list in the targetaddress storage unit 109 before execution of processing in Step S19 includes the address of the device C and the address of the device A as illustrated inFIG. 11 . Then, after the processing of Step S19, the management target address list becomes one illustrated inFIG. 12 . In other words, only the address of the device A is included in the management target address list. - Referring back to
FIG. 4 , thedetection unit 105 replaces the address included in the checked address list with the address included in the assigned address list (Step S21), and stores the address in the checkedaddress storage unit 108. Then, the processing returns to Step S1. As described above, the assigned address list acquired this time is used as the checked address list next time. Thus, in this embodiment, lists of assigned addresses can be acquired at multiple time points, and the acquired lists can be compared with each other. - The execution of the processing as described above enables simple detection of a device newly coupled to the network 7 without introducing a special mechanism into the device. Thus, in the case of application of this embodiment, only replacement with the
management server 1 described above is desired. - Moreover, the
management server 1 can automatically detect a device when the device is coupled to the network 7. Therefore, a network administrator or the like who operates themanagement server 1 does not have to search for the newly coupled device by inputting an IP address and the like. Thus, costs can be reduced. - Next, a second embodiment is described. In the first embodiment, the
detection unit 105 uses the set of IP address and MAC address for the processing. However, in this case, since the processing of searching through the list is performed for both of the IP address and the MAC address, the processing may take time. Therefore, in the second embodiment, a key is associated with a set of an IP address and a MAC address for use in processing by thedetection unit 105. -
FIG. 13 illustrates a functional block diagram of a management server. In the example illustrated inFIG. 13 , amanagement server 1 includes an assignedaddress storage unit 101, aDHCP processing unit 102, aLAN port 103, amanagement unit 104 including adetection unit 105, acheck unit 106 and aDB management unit 107, a checkedaddress storage unit 108, a targetaddress storage unit 109 and an operationlist storage unit 110. Themanagement server 1 according to the second embodiment is different from themanagement server 1 according to the first embodiment in including the operationlist storage unit 110. -
FIG. 14 illustrates an example of a list stored in the checkedaddress storage unit 108. In the example illustrated inFIG. 14 , a key including a MAC address and an IP address, the MAC address and the IP address are stored. The key is generated from the MAC address and the IP address. Note that other data to be used by themanagement unit 104 may be further stored. However, in the initial stage, no list is stored in the checkedaddress storage unit 108. - A format of a list stored in the operation
list storage unit 110 is the same as that of the list stored in the checkedaddress storage unit 108. - A format of a list stored in the assigned
address storage unit 101 and a format of a list stored in the targetaddress storage unit 109 are the same as that of the list stored in the assignedaddress storage unit 101 according to the first embodiment. - Next, with reference to
FIGS. 15 to 19 , description is given of processing executed by themanagement server 1. First, thedetection unit 105 requests theDHCP processing unit 102 for an assigned address list periodically, for example, once every second. Then, thedetection unit 105 acquires the assigned address list from the DHCP processing unit 102 (FIG. 15 : Step S51). The assigned address list acquired in Step S51 is the list illustrated inFIG. 5 , for example. - The
detection unit 105 generates an empty operation list and stores the generated operation list in the operation list storage unit 110 (Step S53). - The
detection unit 105 determines whether or not the assigned address list includes an unprocessed address (Step S55). Note that, when the processing of Step S55 is executed for the first time, the assigned address list includes no processed addresses. Also, the “address” in this processing means a set of a MAC address and an IP address. - When there are unprocessed addresses (Step S55: Yes route), the
detection unit 105 specifies one unprocessed address (Step S57). Then, thedetection unit 105 generates a key from a MAC address and an IP address, which are included in the specified address (Step S59). The key is generated by connecting the MAC address and the IP address, for example. - The
detection unit 105 determines whether or not the address corresponding to the key generated in Step S59 is included in a checked address list (Step S61). The address not included in the checked address list is an address of a device newly coupled to the network 7, which is a new address. Note that, when the processing of Step S61 is executed for the first time, no addresses are included in the checked address list. - Here, it is assumed that a checked address list stored in the checked
address storage unit 108 at the time point of Step S61 is a list illustrated inFIG. 16 . More specifically, it is assumed that the key and address of the device A are stored in the checkedaddress storage unit 108. In this case, the address of the device A from the two addresses illustrated inFIG. 5 is determined not to be a new address, and the address of the device B is determined to be a new address. - Also, it is assumed that a list illustrated in
FIG. 17 is stored in the checkedaddress storage unit 108. More specifically, it is assumed that the key and address of the device C, the key and address of the device A and the key and address of the device B are stored. It is also assumed that an assigned address list acquired this time is the list illustrated inFIG. 5 . In this case, the device C is uncoupled from the network 7, while the devices A and B stay coupled to the network 7. - Referring back to
FIG. 15 , when the address corresponding to the key generated in Step S59 is included in the checked address list (Step S61: Yes route), thedetection unit 105 deletes the key generated in Step S59 and the address specified in Step S57 from the checked address list (Step S63). Then, the processing moves to Step S71. - When, for example, the checked address list is the list illustrated in
FIG. 17 and the assigned address list is the list illustrated inFIG. 5 , the checked address list turns out to be one illustrated inFIG. 18 after completion of Step S63. In other words, the key and address of the device C remain in the checked address list. - On the other hand, when the address corresponding to the key generated in Step S59 is not included in the checked address list (Step S61: No route), the
detection unit 105 instructs thecheck unit 106 to execute check processing. In response to this instruction, thecheck unit 106 executes the check processing (Step S65). The check processing is as described with reference toFIG. 8 . - Then, based on the result of the check processing, the
detection unit 105 determines whether or not the device having the address specified in Step S57 is to be managed (Step S67). When the device is not to be managed (Step S67: No route), the processing moves to Step S71. - On the other hand, when the device is to be managed (Step S67: Yes route), the
detection unit 105 outputs the address specified in Step S57 to theDB management unit 107. Upon receipt of the specified address, theDB management unit 107 adds the received address to a management target address list stored in the target address storage unit 109 (Step S69). Then, the processing moves to Step S71. - The
detection unit 105 adds the key generated in Step S59 and the address specified in Step S57 to the operation list stored in the operation list storage unit 110 (Step S71). Then, the processing returns to Step S55. - The operation
list storage unit 110 stores an operation list as illustrated inFIG. 19 , for example. In the example illustrated inFIG. 19 , the operation list includes the key and address of the device A and the key and address of the device B. - When it is determined in Step S55 that the assigned address list includes no unprocessed address (Step S55: No route), the
detection unit 105 deletes an address, which is included in both the management target address list and the checked address list, from the management target address list (Step S73). - The
detection unit 105 replaces the address included in the checked address list with the address included in the operation list (Step S75), and stores the address in the checkedaddress storage unit 108. Then, the processing returns to Step S51. As described above, the operation list created this time is used as the checked address list next time. - The execution of the processing as described above enables the
detection unit 105 to perform processing using keys. Thus, the processing speed can be increased. - Next, a third embodiment is described. In the second embodiment, the operation
list storage unit 110 is provided to use keys. However, in the third embodiment, keys can be used without providing the operationlist storage unit 110. Therefore, a functional block diagram of amanagement server 1 is the same as that of themanagement server 1 according to the first embodiment. -
FIG. 20 illustrates an example of a checked address list stored in the checkedaddress storage unit 108. In the example illustrated inFIG. 20 , keys each including a MAC address and an IP address, MAC addresses, IP addresses and delete flags are stored. The key is generated from the MAC address and the IP address. The key and address having a delete flag “1” are those of a device that is uncoupled from the network 7. Note that other data to be used by themanagement unit 104 may be further stored. - Next, with reference to
FIGS. 21 to 25 , description is given of processing executed by themanagement server 1. First, thedetection unit 105 requests theDHCP processing unit 102 for an assigned address list periodically, for example, once every second. Then, thedetection unit 105 acquires the assigned address list from the DHCP processing unit 102 (FIG. 21 : Step S81). The assigned address list acquired in Step S81 is the list illustrated inFIG. 5 , for example. - The
detection unit 105 sets all the delete flags in the checked address list to 1 (Step S83). After the processing of Step S83, the checked address list turns out to be one illustrated inFIG. 22 , for example. In the example illustrated inFIG. 22 , the delete flags “1” are set to the keys and addresses of the devices A to C. - The
detection unit 105 determines whether or not the assigned address list includes an unprocessed address (Step S85). Note that, when the processing of Step S85 is executed for the first time, the assigned address list includes no processed addresses. Also, the “address” in this processing means a set of a MAC address and an IP address. - When there are unprocessed addresses (Step S85: Yes route), the
detection unit 105 specifies one unprocessed address (Step S87). Then, thedetection unit 105 generates a key from a MAC address and an IP address, which are included in the specified address (Step S89). The key is generated by connecting the MAC address and the IP address, for example. - The
detection unit 105 determines whether or not the address corresponding to the key generated in Step S89 is included in a checked address list (Step S91). The address not included in the checked address list is an address of a device newly coupled to the network 7, which is a new address. Note that, when the processing of Step S91 is executed for the first time, no addresses are included in the checked address list. - Here, it is assumed that a checked address list stored in the checked
address storage unit 108 at the time point of Step S91 is a list illustrated inFIG. 23 . More specifically, it is assumed that the address of the device A is stored in the checkedaddress storage unit 108. In this case, the address of the device A from the two addresses illustrated inFIG. 5 is determined not to be a new address, and the address of the device B is determined to be a new address. - Also, it is assumed that a list illustrated in
FIG. 22 is stored in the checkedaddress storage unit 108. More specifically, it is assumed that the key and address of the device C, the key and address of the device A and the key and address of the device B are stored. It is also assumed that an assigned address list acquired this time is the list illustrated inFIG. 5 . In this case, the device C is uncoupled from the network 7, while the devices A and B stay coupled to the network 7. - Referring back to
FIG. 21 , when the address corresponding to the key generated in Step S89 is included in the checked address list (Step S91: Yes route), thedetection unit 105 sets the delete flag for the key generated in Step S89 to 0 (Step S93). Then, the processing returns to Step S85. Accordingly, the delete flag “1” is set for the key and address of the device uncoupled from the network 7. - For example, it is assumed that the checked address list is the list illustrated in
FIG. 22 and the assigned address list is the list illustrated inFIG. 5 . In this case, the checked address list turns out to be one illustrated inFIG. 24 after completion of Step S93. Specifically, the delete flag “1” is set for the device C, while the delete flag “0” is set for each of the devices A and B. - On the other hand, when the address corresponding to the key generated in Step S89 is not included in the checked address list (Step S91: No route), the
detection unit 105 instructs thecheck unit 106 to execute check processing. In response to this instruction, thecheck unit 106 executes the check processing (Step S95). The check processing is as described with reference toFIG. 8 . - Then, based on the result of the check processing, the
detection unit 105 determines whether or not the device having the address specified in Step S87 is to be managed (Step S97). When the device is not to be managed (Step S97: No route), the processing moves to Step S101. - On the other hand, when the device is to be managed (Step S97: Yes route), the
detection unit 105 outputs the address specified in Step S87 to theDB management unit 107. Upon receipt of the specified address, theDB management unit 107 adds the received address to a management target address list stored in the target address storage unit 109 (Step S99). Then, the processing moves to Step S101. - The
detection unit 105 adds the key generated in Step S89 and the address specified in Step S87 to the checked address list stored in the checked address storage unit 108 (Step S101). Then, the processing returns to Step S85. - When it is determined in Step S85 that the assigned address list includes no unprocessed address (Step S85: No route), the
detection unit 105 specifies an address having the delete flag “1” set in the checked address list (Step S103). - The
detection unit 105 deletes the address specified in Step S103 from the management target address list and the checked address list (Step S105). Then, the processing returns to Step S81. For example, the checked address list illustrated inFIG. 24 turns out to be one illustrated inFIG. 25 after the execution of the processing of Steps S103 and S105. More specifically, the key and address of the device A and the key and address of the device B are stored in the checked address list. As described above, the keys and addresses of the devices coupled to the network 7 are stored in the checked address list. - The execution of the processing as described above enables the use of keys without providing the operation
list storage unit 110 in themanagement server 1. - Although the embodiments of the present disclosure are described above, the present disclosure is not limited thereto. For example, the functional block configurations of the
management server 1 described above may not coincide with an actual program module configuration. - Also, the configuration of each of the tables described above is an example, and the configurations of the tables do not have to be those described above. Moreover, in the processing flows, the processing order may be changed as long as the processing result is not changed. Furthermore, the processing may be performed in parallel.
- The format of the key is not limited to that described above.
- Note that the
management server 1 described above is a computer device, in which amemory 2501, a central processing unit (CPU) 2503, a hard disk drive (HDD) 2505, adisplay control unit 2507 coupled to adisplay unit 2509, adrive unit 2513 for aremovable disk 2511, aninput unit 2515, and acommunication control unit 2517 for connection to a network are coupled to each other through abus 2519. An operating system (OS) and an application program for carrying out the processing in this example are stored in theHDD 2505, and are read into thememory 2501 from theHDD 2505 when executed by theCPU 2503. TheCPU 2503 controls thedisplay control unit 2507, thecommunication control unit 2517 and thedrive unit 2513 according to processing contents of the application program to perform predetermined operations. Also, data that is being processed is mostly stored in thememory 2501, but may be stored in theHDD 2505. In the example of the present disclosure, the application program for carrying out the processing described above is stored in the computer-readableremovable disk 2511 for distribution and is installed into theHDD 2505 from thedrive unit 2513. Alternatively, the application program may be installed into theHDD 2505 through a network such as the Internet and thecommunication control unit 2517. In such a computer device, various functions as described above are realized by organized cooperation between the hardware such as theCPU 2503 and thememory 2501 and the programs such as the OS and the application program described above. - The embodiments of the present disclosure described above are summed up as follows.
- A management apparatus according to a first aspect of the embodiment includes: (A) an acquisition unit configured to acquire identifiers of one or more devices coupled to a network; and (B) a detection unit configured to compare identifiers acquired by the acquisition unit at a first time point with identifiers acquired by the acquisition unit at a second time point prior to the first time point, and detect an identifier, which is not included in the identifiers acquired at the second time point, from among the identifiers acquired at the first time point.
- Such a configuration enables simple detection of a device newly coupled to the network without introducing a special mechanism into the device.
- The management apparatus further includes: (C) a determination unit configured to determine whether or not the first device is to be managed, based on data indicated by the identifier detected by the detection unit and acquired from the first device; and (D) a data management unit configured to add the identifier of the first device, when the first device is determined to be managed, to a data storage unit configured to store identifiers of devices to be managed. With such a configuration, management of the device indicated by the detected identifier can be started.
- Also, the detection unit described above may (b1) detect an identifier not included in the identifiers acquired at the first time point, from among the identifiers acquired at the second time point, and delete one or more of the detected identifiers from the data storage unit, if the one or more detected identifiers are stored in the data storage unit. With such a configuration, only the identifier of the device to be managed can be stored in the data storage unit.
- Moreover, the identifier described above may include an IP address and a MAC address. The detection unit described above may (b2) generate one key from the IP address and the MAC address and use the key as the identifier. When two identifiers, that is, the IP address and the MAC address are used, the detection processing may take time. Therefore, the use of one key generated from the IP address and the MAC address can reduce the time for the detection processing.
- Furthermore, the acquisition unit described above may (a1) perform DHCP processing. The use of a DHCP enables simple acquisition of identifiers.
- A management method according to the first aspect of the embodiment includes: (E) acquiring identifiers of one or more devices coupled to a network at a first time point; (F) acquiring identifiers of one or more devices coupled to the network at a second time point after the first time point; and (G) comparing the identifiers acquired at the first time point with the identifiers acquired at the second time point, and detecting an identifier not included in the identifiers acquired at the second time point, from among the identifiers acquired at the first time point.
- Note that a program can be created to allow a computer to perform processing by the method described above. The program is stored in a flexible disk, a CD-ROM, a magneto-optical disk, a semiconductor memory, a computer-readable storage medium such as a hard disk or a storage unit. Note that an intermediate processing result is temporarily stored in a storage unit such as a main memory.
- All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Claims (20)
1. An information processing apparatus comprising:
a memory; and
a processor coupled to the memory and configured to
acquire a first identifier indicating a device coupled to a network at a first time point,
acquire a second identifier indicating a device coupled to the network at a second time point after the first time point, and
determine whether or not the second identifier is identical to the first identifier.
2. The information processing apparatus according to claim 1 , wherein the processor is configured to
create a first identifier list including one or more first identifiers indicating one or more devices coupled to the network at the first time point,
create a second identifier list including one or more second identifiers indicating one or more devices coupled to the network at the second time point, and
when any of the second identifiers included in the second identifier list is not included in the first identifier list, determine whether or not the device indicated by the second identifier is to be managed.
3. The information processing apparatus according to claim 2 , wherein the processor is configured to
transmit a first data to the device indicated by the second identifier,
when there is no response to the first data, determine that the device indicated by the second identifier is not to be managed, and
when there is a response to the first data, determine based on a content of the response whether or not the device indicated by the second identifier is to be managed.
4. The information processing apparatus according to claim 2 , wherein the processor is configured to
when any one of the first identifiers included in the first identifier list is not included in the second identifier list, determine that a device indicated by the first identifier is not to be managed.
5. The information processing apparatus according to claim 1 , wherein
the first identifier includes a first Internet Protocol address and a first Media Access Control address of the device indicated by the first identifier, and
the second identifier includes a second Internet Protocol address and a second Media Access Control address of the device indicated by the second identifier.
6. The information processing apparatus according to claim 1 , wherein
the first identifier is generated based on a first Internet Protocol address and a first Media Access Control address of the device indicated by the first identifier, and
the second identifier is generated based on a second Internet Protocol address and a second Media Access Control address of the device indicated by the second identifier.
7. The information processing apparatus according to claim 1 , wherein the processor is configured to execute a Dynamic Host Configuration Protocol.
8. The information processing apparatus according to claim 1 , wherein the processor is configured to acquire an identifier of a device coupled to the network at a predetermined time interval.
9. An information processing method comprising:
acquiring a first identifier indicating a device coupled to a network at a first time point;
acquiring a second identifier indicating a device coupled to the network at a second time point after the first time point; and
determining whether or not the second identifier is identical to the first identifier.
10. The information processing method according to claim 9 , further comprising:
creating a first identifier list including one or more first identifiers indicating one or more devices coupled to the network at the first time point;
creating a second identifier list including one or more second identifiers indicating one or more devices coupled to the network at the second time point; and
when any of the second identifiers included in the second identifier list is not included in the first identifier list, determining whether or not the device indicated by the second identifier is to be managed.
11. The information processing method according to claim 10 , further comprising:
transmitting a first data to the device indicated by the second identifier;
when there is no response to the first data, determining that the device indicated by the second identifier is not to be managed; and
when there is a response to the first data, determining based on a content of the response whether or not the device indicated by the second identifier is to be managed.
12. The information processing method according to claim 10 , further comprising:
when any one of the first identifiers included in the first identifier list is not included in the second identifier list, determining that a device indicated by the first identifier is not to be managed.
13. The information processing method according to claim 9 , wherein
the first identifier includes a first Internet Protocol address and a first Media Access Control address of the device indicated by the first identifier, and
the second identifier includes a second Internet Protocol address and a second Media Access Control address of the device indicated by the second identifier.
14. The information processing method according to claim 9 , wherein
the first identifier is generated based on a first Internet Protocol address and a first Media Access Control address of the device indicated by the first identifier, and
the second identifier is generated based on a second Internet Protocol address and a second Media Access Control address of the device indicated by the second identifier.
15. The information processing method according to claim 9 , further comprising:
executing a Dynamic Host Configuration Protocol.
16. The information processing method according to claim 9 , the acquiring of an identifier of a device coupled to the network is executed at a predetermined time interval.
17. An information processing system comprising:
a plurality of devices; and
an information processing apparatus coupled to a network and including a memory and a processor coupled to the memory and configured to
acquire a first identifier indicating a device included in the plurality of devices coupled to the network at a first time point,
acquire a second identifier indicating a device included in the plurality of devices coupled to the network at a second time point after the first time point, and
determine whether or not the second identifier is identical to the first identifier.
18. The information processing system according to claim 17 , wherein the processor is configured to
create a first identifier list including one or more first identifiers indicating one or more devices coupled to the network at the first time point,
create a second identifier list including one or more second identifiers indicating one or more devices coupled to the network at the second time point, and
when any of the second identifiers included in the second identifier list is not included in the first identifier list, determine whether or not the device indicated by the second identifier is to be managed.
19. The information processing system according to claim 18 , wherein the processor is configured to
transmit a first data to the device indicated by the second identifier,
when there is no response to the first data, determine that the device indicated by the second identifier is not to be managed, and
when there is a response to the first data, determine based on a content of the response whether or not the device indicated by the second identifier is to be managed.
20. The information processing system according to claim 18 , wherein the processor is configured to
when any one of the first identifiers included in the first identifier list is not included in the second identifier list, determine that a device indicated by the first identifier is not to be managed.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013-240518 | 2013-11-21 | ||
JP2013240518A JP2015103827A (en) | 2013-11-21 | 2013-11-21 | Management device, method, and program |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150142960A1 true US20150142960A1 (en) | 2015-05-21 |
Family
ID=53174446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/484,834 Abandoned US20150142960A1 (en) | 2013-11-21 | 2014-09-12 | Information processing apparatus, information processing method and information processing system |
Country Status (2)
Country | Link |
---|---|
US (1) | US20150142960A1 (en) |
JP (1) | JP2015103827A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105933467A (en) * | 2016-04-27 | 2016-09-07 | 浪潮电子信息产业股份有限公司 | Periodic detection method for information change of client host |
US20170012932A1 (en) * | 2015-07-09 | 2017-01-12 | International Business Machines Corporation | Network client id from external managment host via management network |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6675243B1 (en) * | 1999-03-17 | 2004-01-06 | Adaptec, Inc. | Methods and apparatus for implementing a device side advanced serial protocol |
US20040064591A1 (en) * | 2002-09-30 | 2004-04-01 | Erwin Noble | Dynamic network configuration |
US20050009457A1 (en) * | 2003-07-08 | 2005-01-13 | Nitto Kohki Co., Ltd. | Hand-held endless belt abrading machine |
US20060277446A1 (en) * | 2005-06-03 | 2006-12-07 | Canon Kabushiki Kaisha | Centralized monitoring system and method for controlling the same |
US20090207445A1 (en) * | 2008-02-18 | 2009-08-20 | Canon Kabushiki Kaisha | Information processing apparatus and control method thereof |
US20100235513A1 (en) * | 2000-09-08 | 2010-09-16 | Jean-Louis Baffier | Techniques for automatically provisioning a database over a wide area network |
US7864700B2 (en) * | 2003-06-23 | 2011-01-04 | Computer Associates Think, Inc. | Discovering and merging network information |
US20110078311A1 (en) * | 2009-09-29 | 2011-03-31 | Oki Electric Industry Co., Ltd. | Network communication device and automatic reconnection method |
US20110196959A1 (en) * | 2010-02-09 | 2011-08-11 | International Business Machines Corporation | Middleware-driven server discovery |
US20120226791A1 (en) * | 2011-03-03 | 2012-09-06 | Krishnan Ramaswamy | Method and apparatus to detect unidentified inventory |
US8271685B1 (en) * | 2009-10-19 | 2012-09-18 | Sprint Communications Company L.P. | Intelligently assigning an IP address to a mobile device |
US20130198283A1 (en) * | 2012-01-31 | 2013-08-01 | Samsung Electronics Co., Ltd | Apparatus and method of control point for device discovery |
US20140094211A1 (en) * | 2012-09-28 | 2014-04-03 | Brother Kogyo Kabushiki Kaisha | Communication Apparatus |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3557514B2 (en) * | 1999-03-17 | 2004-08-25 | 沖電気工業株式会社 | Network management system |
JP2006303808A (en) * | 2005-04-19 | 2006-11-02 | Sony Computer Entertainment Inc | Radio network device |
JP2007166234A (en) * | 2005-12-14 | 2007-06-28 | Matsushita Electric Works Ltd | Ip address management method and remote monitoring device using it |
JP5318259B1 (en) * | 2012-07-05 | 2013-10-16 | ソフトバンクモバイル株式会社 | Terminal device and connection method thereof |
-
2013
- 2013-11-21 JP JP2013240518A patent/JP2015103827A/en active Pending
-
2014
- 2014-09-12 US US14/484,834 patent/US20150142960A1/en not_active Abandoned
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6675243B1 (en) * | 1999-03-17 | 2004-01-06 | Adaptec, Inc. | Methods and apparatus for implementing a device side advanced serial protocol |
US20100235513A1 (en) * | 2000-09-08 | 2010-09-16 | Jean-Louis Baffier | Techniques for automatically provisioning a database over a wide area network |
US20040064591A1 (en) * | 2002-09-30 | 2004-04-01 | Erwin Noble | Dynamic network configuration |
US7864700B2 (en) * | 2003-06-23 | 2011-01-04 | Computer Associates Think, Inc. | Discovering and merging network information |
US20050009457A1 (en) * | 2003-07-08 | 2005-01-13 | Nitto Kohki Co., Ltd. | Hand-held endless belt abrading machine |
US20060277446A1 (en) * | 2005-06-03 | 2006-12-07 | Canon Kabushiki Kaisha | Centralized monitoring system and method for controlling the same |
US20090207445A1 (en) * | 2008-02-18 | 2009-08-20 | Canon Kabushiki Kaisha | Information processing apparatus and control method thereof |
US20110078311A1 (en) * | 2009-09-29 | 2011-03-31 | Oki Electric Industry Co., Ltd. | Network communication device and automatic reconnection method |
US8271685B1 (en) * | 2009-10-19 | 2012-09-18 | Sprint Communications Company L.P. | Intelligently assigning an IP address to a mobile device |
US20110196959A1 (en) * | 2010-02-09 | 2011-08-11 | International Business Machines Corporation | Middleware-driven server discovery |
US20120226791A1 (en) * | 2011-03-03 | 2012-09-06 | Krishnan Ramaswamy | Method and apparatus to detect unidentified inventory |
US20130198283A1 (en) * | 2012-01-31 | 2013-08-01 | Samsung Electronics Co., Ltd | Apparatus and method of control point for device discovery |
US20140094211A1 (en) * | 2012-09-28 | 2014-04-03 | Brother Kogyo Kabushiki Kaisha | Communication Apparatus |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170012932A1 (en) * | 2015-07-09 | 2017-01-12 | International Business Machines Corporation | Network client id from external managment host via management network |
US20170012931A1 (en) * | 2015-07-09 | 2017-01-12 | International Business Machines Corporation | Network client id from external managment host via management network |
US10129203B2 (en) * | 2015-07-09 | 2018-11-13 | International Business Machines Corporation | Network client ID from external managment host via management network |
US10129204B2 (en) * | 2015-07-09 | 2018-11-13 | International Business Machines Corporation | Network client ID from external management host via management network |
CN105933467A (en) * | 2016-04-27 | 2016-09-07 | 浪潮电子信息产业股份有限公司 | Periodic detection method for information change of client host |
Also Published As
Publication number | Publication date |
---|---|
JP2015103827A (en) | 2015-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8219690B2 (en) | Recording medium that stores internet-protocol (IP) address assignment control program, IP address assignment control apparatus, and IP address assignment control method | |
US20140019970A1 (en) | Virtual machine management system and virtual machine management method | |
WO2019184164A1 (en) | Method for automatically deploying kubernetes worker node, device, terminal apparatus, and readable storage medium | |
JP5888561B2 (en) | Management apparatus and management method | |
US11249788B2 (en) | Cloud management platform, and virtual machine management method and system | |
US20110238820A1 (en) | Computer, communication device, and communication control system | |
US20140032753A1 (en) | Computer system and node search method | |
CN107666493B (en) | Database configuration method and equipment thereof | |
WO2018137520A1 (en) | Service recovery method and apparatus | |
US20140156851A1 (en) | Server facility, method for providing copying service for system of server facility, and copying program for system of sever facility | |
US20150277958A1 (en) | Management device, information processing system, and management program | |
US11416267B2 (en) | Dynamic hardware accelerator selection and loading based on acceleration requirements | |
JP5725191B2 (en) | Power management device, power management method, and power management program | |
WO2013171865A1 (en) | Management method and management system | |
JP2015158773A (en) | Operation verification device for virtual apparatus, operation verification system for virtual apparatus, and program | |
US9674061B2 (en) | Management system, management apparatus and management method | |
JP2016144186A (en) | COMMUNICATION INFORMATION CONTROL DEVICE, RELAY SYSTEM, COMMUNICATION INFORMATION CONTROL METHOD, AND COMMUNICATION INFORMATION CONTROL PROGRAM | |
US20150142960A1 (en) | Information processing apparatus, information processing method and information processing system | |
US20160212068A1 (en) | Information processing system and method for controlling information processing system | |
US9563388B2 (en) | Sharing a hosted device in a computer network | |
CN108228272A (en) | WEB containers generation processing method, equipment and server | |
US20170154004A1 (en) | Information processing apparatus and method for generating coupling information | |
KR20160103814A (en) | Apparatus and method for recoverying error in cloud streaming service system | |
US9667815B2 (en) | Information processing system, information processing device, and information processing method | |
US9798633B2 (en) | Access point controller failover system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:UCHIYAMA, TOSHIKAZU;REEL/FRAME:033732/0666 Effective date: 20140814 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |